cyber threats

What are threats in Cyber Security?

Malicious software programs intended to compromise the security and personal information of companies or individuals through viruses, malware or malicious software through the network, etc are known as threats in cyber security.

Virus:

Viruses are program to execute or attached itself to different programs or file of a system and it can copy itself and propagate through the system, Viruses are also capable of modifying and deleting original data. Usually it is propagated through human action such as opening a infected file or clicking onto suspicious link or downloading attachments.

Malware:

Malware is collectively use for different kinds of threats or viruses plaguing the system which includes spyware, adware, ransomware, rootkits and many more.

Different Types of Malware:

Different Types of Malware:

Worms:

It spreads itself like how worms multiple in humans, it spreads even without interacting often exploiting the weaker areas of the network.

Trojans:

It usually appears to be legitimate software which comes hidden and spreads throughout the system usually copying the data or information compromising the system’s security.

Spyware:

It is usually hidden and undetectable unless specifically checked for spyware with specific software such as malware bytes. It collects sensitive information such as cookies, keystrokes, passwords and browsing history.

Adware:

It usually bombards the system with too many unwanted ads which might be malicious and this is usually bundle with legitimate software’s which requires cautions approach while installing software’s.

Ransomware:

It is design by cyber criminals to planning to hijack your system or information by encrypting information of the victim and demanding payment or ransom for decrypting the data.

Rootkits:

It focuses on changing the system level files usually remaining hidden from detection.

Botnets:

When multiple systems effected by malicious software are connected together and is controlled by cyber criminal a botnet network is created know as botnet.

Protection and Prevention:

  • To protect against viruses and malware, cybersecurity measures include:
  • Keeping operating systems and applications up to date to patch vulnerabilities.
  • Using strong and unique passwords, along with multi-factor authentication.
  • Avoiding suspicious email attachments or links.
  • Employing firewalls and intrusion detection systems.
  • Educating users about safe online practices.

The evolution of viruses and malware has led to sophisticated and evolving cyber threats, making it essential for individuals and organizations to stay vigilant and proactive in their cybersecurity efforts.

Leave a Reply

Your email address will not be published. Required fields are marked *

Index